On Wed, 2008-01-23 at 16:48 -0600, Stephen Torri wrote:
> GCC Community,
> 
> I am a PhD candidate at Auburn University in Alabama investigating
> automated compiler detection for reverse engineering.  The reason I am
> contacting this mailing list is to see if anyone knows of research done
> to discover the compiler used to create a binary executable.
> 
> Sincerely,
> 
> Stephen Torri
> PhD Candidate
> Auburn University
> Department of Computer Science and Software Engineering
> [EMAIL PROTECTED]
> 
> 

If GCC is any guide, this will often be trivial. GCC embeds lots of data
about the source system and compiler in the executable.

> file temp.x
temp.x: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), for
GNU/Linux 2.6.0, dynamically linked (uses shared libs), not stripped

Also in the same file

GCC: (GNU) 4.1.2 (Ubuntu 4.1.2-0ubuntu4)

If this is a reverse engineering project, your adversary will probably
have stripped as much of this kind of thing as possible though.

Tim Josling

Reply via email to